Iptr
Iptr
Iptr
analyzed using traditional data processing tools and techniques. It is characterized by the
3Vs - Volume, Variety, and Velocity. Big data is generated from various sources such as
social media, sensors, mobile devices, and other digital sources.There are generally three
types of Big Data:
Structured Data: This refers to the data that can be easily organized and analyzed using
traditional databases. It includes data from financial transactions, inventory management,
and customer data.
OOP stands for Object-Oriented Programming. It is a programming paradigm that focuses on
the use of objects and their interactions to build software applications. OOP allows
Unstructured Data: This refers to the data that is not organized and cannot be easily developers to create software that is modular, flexible, and reusable. The features of OOP Network architecture refers to the design and structure of a computer network. It Data integrity refers to the accuracy, completeness, and
analyzed using traditional databases. It includes data from social media, emails, images, include: includes the hardware and software components, as well as the protocols and consistency of data stored in a database. It is an important aspect
and videos. communication methods used to enable communication between devices on the of database design because it ensures that the data in the
network., There are two main types of network architectures: client-server and database is reliable and trustworthy.
Encapsulation: This is the process of bundling data and functions together in a single unit peer-to-peer.
Semi-Structured Data: This refers to the data that has some structure but is not fully
called a class. Encapsulation provides data security by restricting access to data from outside
organized. It includes data from web logs, machine data, and sensor data. Data integrity is important because inaccurate or inconsistent data
the class and allowing access only through class functions.
Client-Server Network: In a client-server network architecture, there is a central can lead to errors in business processes, financial reporting, and
server that manages and controls access to resources on the network. Clients or decision-making. Inaccurate data can also damage a company's
In addition to these three types, Big Data can also be classified based on its source, such end-user devices such as desktop computers, laptops, and mobile devices connect reputation and result in legal issues. There are several types of
Inheritance: This is the process of creating a new class from an existing class, inheriting all its
as: to the server to access resources such as files, printers, and databases. The server is data integrity that need to be considered while designing a
properties and methods. Inheritance allows developers to create new classes that are similar
responsible for managing security, authentication, and access control. This database:
to existing classes but with additional or modified features.
architecture is commonly used in businesses and organizations where there is a
Social Media Data: This refers to data generated from social media platforms such as need for centralized control and management of network resources.
Twitter, Facebook, and Instagram. Entity Integrity: Entity integrity ensures that each record in a table
Polymorphism: This is the ability of an object to take on multiple forms. Polymorphism allows
is unique and has a primary key that identifies it. This ensures that
developers to write code that can work with objects of different types, as long as they share a
Peer-to-Peer Network: In a peer-to-peer network architecture, there is no central there are no duplicate records in the table.
common interface.
Machine Data: This refers to data generated by machines and devices such as sensors, server. Instead, all devices on the network are considered equal and can
cameras, and GPS devices. communicate directly with each other to share resources such as files, printers, and
databases. Each device on the network can act as a client or a server, depending on Referential Integrity: Referential integrity ensures that
Abstraction: This is the process of hiding implementation details and showing only the
the resources being accessed. This architecture is commonly used in home networks relationships between tables are maintained. For example, if a
necessary information to the user. Abstraction allows developers to create simpler and easier-
Transaction Data: This refers to data generated from financial transactions such as credit and small businesses where there is no need for centralized control and record in one table has a foreign key that references a record in
to-use interfaces for complex systems.
card transactions, stock trades, and bank transfers. management. another table, the foreign key value must match a primary key
value in the referenced table.
Classes and Objects: Classes are the blueprint for creating objects, which are instances of the
Web Data: This refers to data generated from web logs, clickstream data, and search data. class. Objects contain data and functions, and can interact with other objects to perform The main differences between client-server and peer-to-peer networks are:
Domain Integrity: Domain integrity ensures that data values in a
tasks.
column meet certain requirements, such as data type, format, and
Overall, Big Data is an important area of study as it can provide valuable insights into Centralization: In client-server networks, there is a central server that manages and range. For example, a column that stores dates should only allow
customer behavior, market trends, and business operations. controls access to resources. In peer-to-peer networks, all devices are considered valid dates to be entered.
Modularity: OOP allows developers to build applications using modules, which are self-
contained units of code that can be easily reused and combined to create larger systems. equal and can communicate directly with each other.
Simplex, Half Duplex, and Full Duplex are three types of communication modes used in computer First Normal Form (1NF): This form requires that all data in a table be atomic,
Transport Layer: The transport layer is the fourth layer in the OSI model, responsible for end-
networks and telecommunications. meaning that each column should contain only one piece of data. For example, a
to-end data delivery between applications. It provides reliable and ordered delivery of data,
using mechanisms such as flow control, error recovery, and congestion control. table that stores customer data should not have a single column that contains both
the customer's first name and last name.
Simplex: In simplex mode, data can only be transmitted in one direction. It means that a device can
either send or receive data, but not both at the same time. The receiver cannot send any feedback
Session Layer: The session layer is the fifth layer in the OSI model, responsible for
to the sender. Examples of simplex mode communication are broadcast radio or television signals, Second Normal Form (2NF): This form requires that all non-key attributes in a table
establishing, maintaining, and terminating communication sessions between devices. It
and computer keyboards where only the input data is sent. be dependent on the primary key. This means that a table should not have
provides services such as session synchronization, checkpointing, and recovery, and
attributes that are dependent on only a part of the primary key. For example, a
manages session security and authentication.
table that stores sales data should not have an attribute for the sales
Half Duplex: In half-duplex mode, data can be transmitted in both directions, but not at the same representative's phone number if the phone number is not dependent on the sales
time. This means that a device can either send or receive data, but not both simultaneously. The representative ID.
Presentation Layer: The presentation layer is the sixth layer in the OSI model, responsible for
sender must wait for the receiver to acknowledge the data before sending more data. Examples of
data representation and formatting. It ensures that data is presented to the application layer
half-duplex mode communication are walkie-talkies, CB radios, and some computer networks.
in a usable format, regardless of the underlying data representation and encoding.
Third Normal Form (3NF): This form requires that all non-key attributes in a table
be independent of each other. This means that a table should not have attributes
Full Duplex: In full-duplex mode, data can be transmitted in both directions simultaneously. This that are dependent on other non-key attributes. For example, a table that stores
Application Layer: The application layer is the seventh and final layer in the OSI model,
means that a device can send and receive data at the same time, and there is no need to wait for product data should not have an attribute for the product's manufacturer if the
responsible for providing services to user applications. It includes protocols such as HTTP,
acknowledgments. This type of communication mode is commonly used in high-speed manufacturer's information is already stored in a separate table.
FTP, SMTP, and Telnet, which enable user applications to access network resources and
communication networks such as the internet, Ethernet networks, and telephone systems.
services.
Boyce-Codd Normal Form (BCNF): This form is similar to 3NF but is more restrictive.
In summary, Simplex mode is unidirectional, Half Duplex mode is bidirectional but not It requires that every determinant in a table be a candidate key. This means that a
Overall, the OSI reference model provides a standard framework for the design and
simultaneously, while Full Duplex mode is bidirectional and simultaneous. The choice of table should not have any functional dependencies that are not based on the
implementation of computer networks, allowing different systems to interoperate and
communication mode depends on the requirements of the application, the available resources, and candidate keys.
communicate effectively.
the desired speed and reliability of communication.
In this example, the JavaScript code is included within the <script> tags in the <body> section community support: PHP has a large and active community of developers
Artificial Intelligence (AI): OOP is used in AI for modeling complex real-world
of the HTML document. The code defines a function called "myFunction" that displays an Network Security: Network security involves the implementation of measures who contribute to its development and maintenance. This means that
systems. For example, an AI system could use OOP to create objects
alert message when called. This function is then attached to a button element using the to secure computer networks from unauthorized access, hacking, and other there are a lot of resources available online, such as documentation,
representing different aspects of a problem domain, such as customers,
"onclick" attribute. When the user clicks the button, the function is executed and the alert cyber threats. Measures such as firewalls, antivirus software, and intrusion tutorials, and forums.
products, or orders.
message is displayed. detection systems can be used to secure networks.
Mobile development: OOP is commonly used in mobile app development Overall, PHP is a flexible, powerful, and popular language that has many
This is a simple example of how JavaScript can be added to an HTML page to create Data Masking: Data masking is the process of obfuscating data by replacing advantages for web developers.
because it allows for the creation of reusable code components. For
interactivity and user engagement. By adding more complex JavaScript code, web developers sensitive data with fictitious data. This ensures that the sensitive data cannot
example, an app that uses a database to store user information could use
can create dynamic and responsive web pages that provide a rich user experience. be accessed or used by unauthorized users.
OOP to create a reusable object representing the database.